CN106815905A - A kind of method and system based on mobile terminal checking - Google Patents

A kind of method and system based on mobile terminal checking Download PDF

Info

Publication number
CN106815905A
CN106815905A CN201611076752.1A CN201611076752A CN106815905A CN 106815905 A CN106815905 A CN 106815905A CN 201611076752 A CN201611076752 A CN 201611076752A CN 106815905 A CN106815905 A CN 106815905A
Authority
CN
China
Prior art keywords
password
log
user
entrance guard
intelligent entrance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611076752.1A
Other languages
Chinese (zh)
Inventor
张哲文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Playright Mdt Infotech Ltd
Original Assignee
Shenzhen Playright Mdt Infotech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Playright Mdt Infotech Ltd filed Critical Shenzhen Playright Mdt Infotech Ltd
Priority to CN201611076752.1A priority Critical patent/CN106815905A/en
Publication of CN106815905A publication Critical patent/CN106815905A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/33Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a password
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/14With a sequence of inputs of different identification information

Abstract

The embodiment of the invention discloses a kind of method and system based on mobile terminal checking, method includes:The subscriber identity information of remote monitoring server collection validated user is simultaneously sent to intelligent entrance guard;Intelligent entrance guard receives the registration request of user and is matched with subscriber identity information;If the match is successful, receive registration request;Intelligent entrance guard points out user to be input into the first log-in password and the second log-in password by mobile terminal, first log-in password is the double finger-print ciphers after encryption, second log-in password is numerical ciphers or is to press to press mobile terminal second pressing code of number of touch screen in first number of mobile terminal touch screen and the second Preset Time in the first Preset Time, and the second log-in password is included for the user cipher of opening gate and for opening gate and the alarm cipher of alarm;When user needs opening gate, intelligent entrance guard is then alarmed when verifying that the second log-in password is alarm cipher.Using the present invention, the security and convenience of intelligent entrance guard can be improved.

Description

A kind of method and system based on mobile terminal checking
Technical field
The present invention relates to intelligent entrance guard technical field, more particularly to a kind of method and system based on mobile terminal checking.
Background technology
In the development course of gate control system, password access system is most original, be also it is most simple, cost minimization, But because its security performance is than relatively low, thus gate control system of fading out gradually field.Afterwards, gate control system of swiping the card or card Sensing gate control system due to durable, cost performance is good, the advantage such as reading speed is fast, therefore as the main flow of current gate control system. But in recent years, due to developing rapidly for mobile terminal, its is intelligent can to bring great convenience for user, more and more Intelligent entrance guard starts to carry out the unlatching of gate inhibition with mobile terminal cooperation.
The method that mobile terminal is verified is although advanced, but user may lose and be usurped by undesirable.Additionally, with Family is likely to be threatened haves no alternative but be opened the door using the mobile terminal of oneself.With continuing to develop for intelligent entrance guard, traditional In gate control system, after controller carries out authentication by receiving certain data, i.e. the action of controlling switch door.This gate inhibition The data that system is sent to controller are generally all the customizing messages of the mobile terminal of user.But cannot judge that user uses shifting Whether it is voluntary when dynamic terminal is verified or is coerced.And in bank, customs, prison or other confidential departments, Safety requirements to gate inhibition's keyholed back plate is very high, if intelligent entrance guard can only open the door when there are abnormal conditions, then its Security or far from being enough.
The content of the invention
Embodiment of the present invention technical problem to be solved is, there is provided a kind of method based on mobile terminal checking and be System.It is inadequate to solve the problems, such as intelligent entrance guard security.
In order to solve the above-mentioned technical problem, embodiment of the present invention first aspect provide it is a kind of based on mobile terminal checking Method, including:
Remote monitoring server gathers the subscriber identity information of validated user, and subscriber identity information is sent to intelligent door Prohibit;
The intelligent entrance guard receives the registration request of user, and the information that will be carried in registration request is entered with subscriber identity information Row matching;
If the match is successful, receive the registration request;
After registration request is by receiving, the intelligent entrance guard points out the log-in password of user input first;
Mobile terminal shows the nine grids of subsidiary Digital ID by touch screen, points out user to select at least two grid defeated Enter different fingerprints, the Digital ID of the grid selected user and the user fingerprints collected on the grid carry out default adding The encryption of close algorithm, generates the first log-in password;
First log-in password is sent to the intelligent entrance guard by mobile terminal;
The intelligent entrance guard has been collected after the first log-in password, is kept wireless connection with the mobile terminal and is pointed out to use Family is input into the second log-in password, and second log-in password is numerical ciphers or is touched to press mobile terminal in the first Preset Time Pressing mobile terminal second pressing code of number of touch screen in control first number of screen and the second Preset Time, and described second Log-in password is included for the user cipher of opening gate and for opening gate and the alarm cipher of alarm;
When user needs opening gate, the intelligent entrance guard receives the first note that user is sent by the mobile terminal Volume password, is decrypted and verifies according to default decipherment algorithm corresponding with the predetermined encryption algorithm;
After first log-in password is verified, the intelligent entrance guard points out the log-in password of user input second;
The mobile terminal senses the compression number of user, and the second log-in password of generation is sent to the intelligent entrance guard;
When second log-in password is verified as user cipher, opening gate, when second log-in password is verified as During alarm cipher, opening gate is simultaneously alarmed.
Embodiment of the present invention second aspect provides a kind of system, including:
Remote monitoring server, the subscriber identity information for gathering validated user, and by subscriber identity information send to Intelligent entrance guard;
The intelligent entrance guard, the registration request for receiving user, the information that will be carried in registration request and user identity Information is matched;If the match is successful, receive the registration request;After registration request is by receiving, the intelligent door Taboo is additionally operable to point out the log-in password of user input first;
Mobile terminal, the nine grids for showing subsidiary Digital ID by touch screen, points out user's selection at least two Grid is input into different fingerprints, and the Digital ID of the grid selected user and the user fingerprints collected on the grid are carried out The encryption of predetermined encryption algorithm, generates the first log-in password;And first log-in password is sent to the intelligence Gate inhibition;
The intelligent entrance guard has been collected after the first log-in password, is kept wireless connection with the mobile terminal and is pointed out to use Family is input into the second log-in password, and second log-in password is numerical ciphers or is touched to press mobile terminal in the first Preset Time Pressing mobile terminal second pressing code of number of touch screen in control first number of screen and the second Preset Time, and described second Log-in password is included for the user cipher of opening gate and for opening gate and the alarm cipher of alarm;When user needs During opening gate, the intelligent entrance guard is additionally operable to receive the first log-in password that user is sent by the mobile terminal, according to Default decipherment algorithm corresponding with the predetermined encryption algorithm is decrypted and verifies;When first log-in password is verified Afterwards, the intelligent entrance guard prompting log-in password of user input second;
The mobile terminal is additionally operable to sense the compression number of user, and the second log-in password of generation is sent to the intelligent door Prohibit;
The intelligent entrance guard is additionally operable to when second log-in password is verified as user cipher, opening gate, when described When second log-in password is verified as alarm cipher, opening gate is simultaneously alarmed.
Implement the embodiment of the present invention, have the advantages that:
Intelligent access control system is connected and composed by by intelligent entrance guard, mobile terminal and remote monitoring server, user passes through Intelligent entrance guard and remote monitoring server are registered after user identity is confirmed, it is ensured that the correctness of user identity;Then by Mobile terminal and intelligent entrance guard coordinate the log-in password of typing first and the second log-in password;User can be by verifying password Mode opening gate, because the first log-in password is double finger-print ciphers, therefore security is higher, and has used the double fingers after encryption Line password is more difficult to crack as the first log-in password, illegal molecule, and security is also higher;And it is close due to adding the second registration Code, therefore relative to the mode of single password, security is higher, and the input mode of the second log-in password is numeral or different pre- If pressing different number of times respectively in the time, crypticity is stronger if pressing, and the second log-in password includes user cipher and report Alert password, when being threatened beneficial to user, concealed alarm fully improves the security of intelligent entrance guard.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to institute in embodiment The accompanying drawing for needing to use is briefly described, it should be apparent that, drawings in the following description are only some implementations of the invention Example, for those of ordinary skill in the art, on the premise of not paying creative work, can also obtain according to these accompanying drawings Obtain other accompanying drawings.
Fig. 1 is a kind of schematic flow sheet of the method based on mobile terminal checking of the embodiment of the present invention;
Fig. 2 is a kind of composition schematic diagram of system of the embodiment of the present invention.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.It is based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made Embodiment, belongs to the scope of protection of the invention.
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.It is based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made Embodiment, belongs to the scope of protection of the invention.
Fig. 1 is refer to, is a kind of schematic flow sheet of the method based on mobile terminal checking of the embodiment of the present invention, in this reality Apply in example, the described method comprises the following steps:
S101, remote monitoring server gather validated user subscriber identity information, and by subscriber identity information send to Intelligent entrance guard.
Alternatively, subscriber identity information includes user biological characteristic information, ID card information, photo, phone number, individual At least one of setting code, in order to ensure the correctness of user identity, can be used in combination, so as to typing system with much information System is the information of validated user.
S102, intelligent entrance guard receives the registration request of user, the information that will be carried in registration request and subscriber identity information Matched.
S103, if the match is successful, receives the registration request.
S104, after registration request is by receiving, the intelligent entrance guard points out the log-in password of user input first.
S105, mobile terminal shows the nine grids of subsidiary Digital ID by touch screen, points out user's selection at least two Grid is input into different fingerprints, and the Digital ID of the grid selected user and the user fingerprints collected on the grid are carried out The encryption of predetermined encryption algorithm, generates the first log-in password.
Alternatively, the grid random alignment in the nine grids.Can so avoid checking that user uses by illegal molecule Which finger fingerprint, cannot also determine the Digital ID of grid.
Due to needing to be input at least two different fingerprints, therefore security is higher than the security of conventional single fingerprint. And the grid in the nine grids can be with random alignment.The position of so each user input all changes, and is difficult by other Invalid user stealing.For example, user have selected the 1 lattice input right hand index fingerprint in nine grids, right hand middle finger is input into 6 lattice Fingerprint, then user can simultaneously with right hand forefinger 1 lattice of percussion when password is verified, right hand middle finger taps 6 lattice, it is of course also possible to first 1 lattice are tapped with right hand forefinger, then 6 lattice are tapped with right hand middle finger, the position of 1 lattice and 6 lattice may change every time, and in unblock When input fingerprint order can be the same or different, the embodiment of the present invention is not limited in any way.
First log-in password is sent to the intelligent entrance guard by S106, mobile terminal.
S107, the intelligent entrance guard has been collected after the first log-in password, points out the log-in password of user input second, described Second log-in password is numerical ciphers or is that pressing first number of mobile terminal touch screen in the first Preset Time and second are pre- If pressing mobile terminal second pressing code of number of touch screen in the time, and second log-in password is including for opening door The user cipher of taboo and for opening gate and alarm alarm cipher.
Single biometrics password security is relatively low, there is the possibility for being replicated and usurping, and existing intelligent entrance guard is using above-mentioned Single password is very easy to the situation that password is obtained by unauthorized person, therefore, in the present embodiment, introduce the second registration close Code is used to improve the security of password.Second log-in password is numerical ciphers or is touched to press mobile terminal in the first Preset Time Pressing mobile terminal second pressing code of number of touch screen in control first number of screen and the second Preset Time, and described second Log-in password is included for the user cipher of opening gate and for opening gate and the alarm cipher of alarm.So, user In normal use, the normally-open intelligent entrance guard of user cipher can be input into, it is also possible to be input into alarm cipher when being threatened, Alarmed by intelligent entrance guard while opening gate, in order to improve security, alarm herein is alarmed for secret, the secret alarm Implementation be typically, gate inhibition's connect setting controls alarm bell to alarm in the emergency alarm bell of room security by switching signal, and threatens One's share of expenses for a joint undertaking is not aware that alarm has occurred and that, it is also possible to by the alarm of remotely administered server real-time reception gate inhibition, to room security report Police dials 110 alarms by being connected to the modem of remote monitoring server, or can also be directly by intelligent entrance guard Modem backstage dial 110 alarms.The embodiment of the present invention is not limited in any way.
Alarm cipher is different from user cipher, and when alarm cipher is numerical ciphers, it can be than user cipher digit Less numerical ciphers, such as user cipher are 5, and alarm cipher is 1, is pressed after user input is complete by acknowledgement key by intelligence Energy gate inhibition receives and is judged to that alarm cipher carries out alert process.And when alarm cipher is pressing code, the first Preset Time Be can be the same or different with the second Preset Time, first number and second number can be the same or different, for example, the One presses 3 times in 5 seconds, and second pressing 4 in 3 seconds is inferior.After the first Preset Time is reached, mobile terminal can pass through The auditory tone cues user of " ticking ".Will pressing mobile terminal touch screen as the second log-in password, and pressing herein and touch or Tap different, pressing can be pressed when sustained touch touch screen, mobile terminal is sensed by pressure inductor presses Power size judges compression number, and it is then different to touch number of times and number of taps, therefore pressing operation crypticity is stronger, be difficult by Check or usurped after listening to;And pressing must just possess availability after the checking of the first log-in password, therefore in the first registration When password is not verified, without the pressing that processing detection is arrived, can avoid processing user misoperation or unconscious operation.Though Two passwords are so provided with, but user input is very convenient simple, only need to press mobile whole after the double fingerprints of input are scanned End touch screen, relatively single password had both improve the security of intelligent entrance guard, turn avoid the fiber crops that Complicated Flow brings Tired, user experience is preferable.And second log-in password be not single pressing in a time, crypticity is stronger, Ke Yiti The complexity and degree of safety of the second log-in password high.
S108, when user needs opening gate, the intelligent entrance guard receives what user was sent by the mobile terminal First log-in password, is decrypted and verifies according to default decipherment algorithm corresponding with the predetermined encryption algorithm.
Alternatively, the predetermined encryption algorithm and the default decipherment algorithm are unsymmetrical key, and the predetermined encryption Algorithm is associated and while dynamic change with the default decipherment algorithm.
Wherein, symmetric key encryption is also named secret/private key encryption (Secret Key Encryption, SKE), i.e., The both sides for sending and receiving data must encrypt and decrypt computing using identical/symmetrical key to plaintext.It is asymmetric Key encryption be also public key encryption (Public Key Encryption, PKE), refer to everyone have a pair uniquely it is right The key answered:Public-key cryptography and private cipher key, public key external disclosure, private key are preserved by privacy;With wherein one key come Encryption, can only just decrypt key with another.The side for sending data is added with the public key of the opposing party to the information for sending It is close, then it is decrypted with the private key of oneself by recipient.The issue and management that public key encryption technology solves key are asked Topic, is the core of current commercial code.Using public key technique, the both sides for entering row data communication can safely confirm other side Identity and public-key cryptography, there is provided the identifiability of communication.
Alternatively, the AES is corresponding with decipherment algorithm and dynamic change simultaneously.For example, many set correspondences can be consulted Enciphering and deciphering algorithm, followed by every time when using agreement use wherein a set of, mobile terminal can identify letter by transmission algorithm Cease to inform intelligent entrance guard.So the enciphering and deciphering algorithm of dynamic change can further lifting system security.
Finger print information after sending encryption can provide Double-protection, ground floor as the first log-in password for system The decryption protection being made up of AES, the second layer is that the complicated calculations being made up of the uniqueness and complexity of finger print information are prevented Shield so that illegally molecule cannot be cracked or simulating mobile terminal is sent to the signal of intelligent entrance guard, it is ensured that the safety of system.
S109, after first log-in password is verified, the intelligent entrance guard prompting user input second is registered Password.
S110, the mobile terminal senses the compression number of user, and the second log-in password of generation is sent to the intelligent door Prohibit.
S111, when second log-in password is verified as user cipher, opening gate, when second log-in password is tested Demonstrate,prove during for alarm cipher, opening gate is simultaneously alarmed.
Alternatively, when second log-in password is verified as alarm cipher, can also be passed through by remote monitoring server Monitoring camera carries out recognition of face and amplifies face to take pictures to user and its at one's side personnel, preserves the result of recognition of face And the photo for shooting.It is easy to follow-up tracking to threaten one's share of expenses for a joint undertaking.
Alternatively, when second log-in password is verified as alarm cipher, also include:
User's emergency number set in advance is dialed on the mobile terminal backstage.The mode of alarm is further enriched, is improved Security.
Alternatively, the mobile terminal is mobile phone, panel computer or wearable device.
In the present embodiment, intelligent entrance guard is connected and composed by by intelligent entrance guard, mobile terminal and remote monitoring server System, user is registered by intelligent entrance guard and remote monitoring server after user identity is confirmed, it is ensured that user identity Correctness;Then the log-in password of typing first and the second log-in password with mobile terminal and intelligent entrance guard;User can be with The opening gate by way of verifying password, because the first log-in password is double finger-print ciphers, therefore security is higher, and uses Used as the first log-in password, illegal molecule is more difficult to crack double finger-print ciphers after encryption, security is also higher;And due to adding Second log-in password, therefore relative to the mode of single password, security is higher, and the input mode of the second log-in password is Different number of times are pressed respectively in numeral or different Preset Times, and crypticity is stronger if pressing, and the second log-in password includes User cipher and alarm cipher, when being threatened beneficial to user, concealed alarm fully improves the security of intelligent entrance guard.
Alternatively, in addition to intelligent entrance guard locally preserves the first log-in password and the second log-in password is verified, also Can be verified by remote monitoring server.Although remote monitoring server carries out verifying that possible efficiency can be slightly slow, Security can be further lifted, especially when intelligent entrance guard breaks down and cannot verify, is carried out by remote monitoring server Checking, can further lifting system work stability.
Alternatively, when intelligent entrance guard is damaged or is needed to carry out system update, it is necessary to when changing intelligent entrance guard, the intelligent door Prohibit to send first log-in password and second log-in password to the remote monitoring server and preserve;
When the intelligent entrance guard is changed, the remote monitoring server sends to replacing the code data of preservation Intelligent entrance guard afterwards.
So that it is guaranteed that changing the integrality and security of front and rear user data.
Such as 3 times after the failure of password multiple authentication, then intelligent entrance guard can disconnect and mobile terminal within a period of time Connection, or the password authentification of refusal mobile terminal is asked within a period of time.
Fig. 2 is refer to, is a kind of composition schematic diagram of system of the embodiment of the present invention, in the present embodiment, the system bag Include:Remote monitoring server 200, the intelligent entrance guard 100 of mobile terminal 300 and at least one.Intelligent entrance guard 100 is included for being remote Range monitoring server 200 provides the camera of monitored picture, and for decrypting and verifying the authentication module of password.Remote monitoring Server 200 includes display and the server for data storage, and mobile terminal includes the collection for collecting user fingerprints Module, the encrypting module and touch screen that are encrypted to fingerprint.
Specifically, remote monitoring server 200, the subscriber identity information for gathering neighbours living, and by user identity Information is sent to intelligent entrance guard 100;
The intelligent entrance guard 100, the registration request for receiving user, the information that will be carried in registration request and user's body Part information is matched;
If the match is successful, receive the registration request;
After registration request is by receiving, the intelligent entrance guard 100 is additionally operable to point out the log-in password of user input first;
Mobile terminal 300, the nine grids for showing subsidiary Digital ID by touch screen, points out user's selection at least two Individual grid is input into different fingerprints, and the Digital ID of the grid selected user and the user fingerprints collected on the grid enter The encryption of row predetermined encryption algorithm, generates the first log-in password;And first log-in password is sent to the intelligence Can gate inhibition;
The intelligent entrance guard 200 is additionally operable to have collected after the first log-in password, keeps wireless with the mobile terminal 300 The log-in password of user input second is connected and points out, second log-in password is for numerical ciphers or to be pressed in the first Preset Time Pressure first number of mobile terminal touch screen and the second Preset Time in pressing mobile terminal second number of touch screen by densification Code, and second log-in password is close including the user cipher for opening gate and for the alarm of opening gate and alarm Code;When user needs opening gate, the intelligent entrance guard 100 is additionally operable to receive user is sent by the mobile terminal the One log-in password, is decrypted and verifies according to default decipherment algorithm corresponding with the predetermined encryption algorithm;When user needs During opening gate, the intelligent entrance guard 100 is additionally operable to receive the first log-in password that user is sent by the mobile terminal, root It is decrypted and verifies according to default decipherment algorithm corresponding with the predetermined encryption algorithm;When first log-in password checking is logical After crossing, the prompting log-in password of user input second of the intelligent entrance guard 200;
The mobile terminal 300 is additionally operable to sense the compression number of user, and the second log-in password of generation is sent to the intelligence Can gate inhibition;
The intelligent entrance guard 200 is additionally operable to when second log-in password is verified as user cipher, and opening gate works as institute When stating the second log-in password and being verified as alarm cipher, opening gate is simultaneously alarmed.
Alternatively, the grid random alignment in the nine grids.
The predetermined encryption algorithm and the default decipherment algorithm are unsymmetrical key, and the predetermined encryption algorithm and institute State default decipherment algorithm association and simultaneously dynamic change.
Alternatively, the remote monitoring server 200 is additionally operable to:
When second log-in password is verified as alarm cipher, by monitoring camera, to user and its at one's side, personnel enter Row recognition of face is simultaneously amplified face and is taken pictures, and preserves the result of recognition of face and the photo of shooting.
The intelligent entrance guard 100 is additionally operable to:
First log-in password and second log-in password are sent to the remote monitoring server 200 and preserved;
The remote monitoring server 200 is additionally operable to:
When the intelligent entrance guard 100 is changed, the code data that the remote monitoring server 200 will be preserved sends Intelligent entrance guard to after changing.
Alternatively, when second log-in password is verified as alarm cipher, the mobile terminal 300 is additionally operable to backstage and dials Beat user's emergency number set in advance.
The mobile terminal is mobile phone, panel computer or wearable device.
It should be noted that each embodiment in this specification is described by the way of progressive, each embodiment weight Point explanation is all difference with other embodiments, between each embodiment identical similar part mutually referring to. For device embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, related part referring to The part explanation of embodiment of the method.
By the description of above-described embodiment, the present invention has advantages below:
Intelligent access control system is connected and composed by by intelligent entrance guard, mobile terminal and remote monitoring server, user passes through Intelligent entrance guard and remote monitoring server are registered after user identity is confirmed, it is ensured that the correctness of user identity;Then by Mobile terminal and intelligent entrance guard coordinate the log-in password of typing first and the second log-in password;User can be by verifying password Mode opening gate, because the first log-in password is double finger-print ciphers, therefore security is higher, and has used the double fingers after encryption Line password is more difficult to crack as the first log-in password, illegal molecule, and security is also higher;And it is close due to adding the second registration Code, therefore relative to the mode of single password, security is higher, and the input mode of the second log-in password is numeral or different pre- If pressing different number of times respectively in the time, crypticity is stronger if pressing, and the second log-in password includes user cipher and report Alert password, when being threatened beneficial to user, concealed alarm fully improves the security of intelligent entrance guard.
One of ordinary skill in the art will appreciate that all or part of flow in realizing above-described embodiment method, can be The hardware of correlation is instructed to complete by computer program, described program can be stored in a computer read/write memory medium In, the program is upon execution, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic Dish, CD, read-only memory (Read-Only Memory, abbreviation ROM) or random access memory (Random Access Memory, abbreviation RAM) etc..
Above disclosed is only present pre-ferred embodiments, can not limit the right model of the present invention with this certainly Enclose, therefore the equivalent variations made according to the claims in the present invention, still belong to the scope that the present invention is covered.

Claims (10)

1. it is a kind of based on mobile terminal checking method, it is characterised in that including:
Remote monitoring server gathers the subscriber identity information of validated user, and subscriber identity information is sent to intelligent entrance guard;
The intelligent entrance guard receives the registration request of user, and the information that will be carried in registration request and subscriber identity information are carried out Match somebody with somebody;
If the match is successful, receive the registration request;
After registration request is by receiving, the intelligent entrance guard points out the log-in password of user input first;
Mobile terminal shows the nine grids of subsidiary Digital ID by touch screen, points out user to select the input of at least two grid not Same fingerprint, the Digital ID of the grid selected user and the user fingerprints collected on the grid carry out predetermined encryption calculation The encryption of method, generates the first log-in password;
First log-in password is sent to the intelligent entrance guard by mobile terminal;
The intelligent entrance guard has been collected after the first log-in password, is kept wireless connection with the mobile terminal and is pointed out user defeated Enter the second log-in password, second log-in password is numerical ciphers or is pressing mobile terminal touch screen in the first Preset Time Pressing mobile terminal second pressing code of number of touch screen in first number and the second Preset Time, and second registration Password is included for the user cipher of opening gate and for opening gate and the alarm cipher of alarm;
When user needs opening gate, the intelligent entrance guard reception user is close by the first registration that the mobile terminal sends Code, is decrypted and verifies according to default decipherment algorithm corresponding with the predetermined encryption algorithm;
After first log-in password is verified, the intelligent entrance guard points out the log-in password of user input second;
The mobile terminal senses the compression number of user, and the second log-in password of generation is sent to the intelligent entrance guard;
When second log-in password is verified as user cipher, opening gate, when second log-in password is verified as alarm During password, opening gate is simultaneously alarmed.
2. the method for claim 1, it is characterised in that when second log-in password is verified as alarm cipher, also Including:
Remote monitoring server carries out recognition of face and amplifies face to carry out by monitoring camera to user and its at one's side personnel Take pictures, preserve the result of recognition of face and the photo of shooting.
3. the method for claim 1, it is characterised in that also include:
The intelligent entrance guard sends to the remote monitoring server first log-in password and second log-in password Preserve;
When the intelligent entrance guard is changed, the remote monitoring server sends to replacing the code data of preservation Intelligent entrance guard.
4. the method for claim 1, it is characterised in that when second log-in password is verified as alarm cipher, also Including:
User's emergency number set in advance is dialed on the mobile terminal backstage.
5. the method as described in claim any one of 1-4, it is characterised in that the grid random alignment in the nine grids, institute Predetermined encryption algorithm and the default decipherment algorithm are stated for unsymmetrical key, and the predetermined encryption algorithm and the default decryption Algorithm association and simultaneously dynamic change.
6. a kind of system, it is characterised in that including:
Remote monitoring server, the subscriber identity information for gathering validated user, and subscriber identity information is sent to intelligence Gate inhibition;
The intelligent entrance guard, the registration request for receiving user, the information that will be carried in registration request and subscriber identity information Matched;If the match is successful, receive the registration request;After registration request is by receiving, the intelligent entrance guard is also For pointing out the log-in password of user input first;
Mobile terminal, the nine grids for showing subsidiary Digital ID by touch screen, points out user to select at least two grid The different fingerprint of input, the Digital ID of the grid selected user and the user fingerprints collected on the grid are preset The encryption of AES, generates the first log-in password;And first log-in password is sent to the intelligent entrance guard;
The intelligent entrance guard has been collected after the first log-in password, is kept wireless connection with the mobile terminal and is pointed out user defeated Enter the second log-in password, second log-in password is numerical ciphers or is pressing mobile terminal touch screen in the first Preset Time Pressing mobile terminal second pressing code of number of touch screen in first number and the second Preset Time, and second registration Password is included for the user cipher of opening gate and for opening gate and the alarm cipher of alarm;When user needs to open During gate inhibition, the intelligent entrance guard is additionally operable to receive the first log-in password for being sent by the mobile terminal of user, according to institute The corresponding default decipherment algorithm of predetermined encryption algorithm is stated to be decrypted and verify;When first log-in password is verified it Afterwards, the intelligent entrance guard prompting log-in password of user input second;
The mobile terminal is additionally operable to sense the compression number of user, and the second log-in password of generation is sent to the intelligent entrance guard;
The intelligent entrance guard is additionally operable to when second log-in password is verified as user cipher, opening gate, when described second When log-in password is verified as alarm cipher, opening gate is simultaneously alarmed.
7. system as claimed in claim 6, it is characterised in that the remote monitoring server is additionally operable to:
When second log-in password is verified as alarm cipher, by monitoring camera, to user and its at one's side, personnel enter pedestrian Face recognizes and amplifies face and taken pictures, and preserves the result of recognition of face and the photo of shooting.
8. system as claimed in claim 6, it is characterised in that the intelligent entrance guard is additionally operable to:
First log-in password and second log-in password are sent to the remote monitoring server and is preserved;
The remote monitoring server is additionally operable to:
When the intelligent entrance guard is changed, the remote monitoring server sends to replacing the code data of preservation Intelligent entrance guard.
9. system as claimed in claim 6, it is characterised in that when second log-in password is verified as alarm cipher, institute State mobile terminal and be additionally operable to backstage and dial user's emergency number set in advance.
10. the system as described in claim any one of 6-9, it is characterised in that the grid random alignment in the nine grids, institute Predetermined encryption algorithm and the default decipherment algorithm are stated for unsymmetrical key, and the predetermined encryption algorithm and the default decryption Algorithm association and simultaneously dynamic change.
CN201611076752.1A 2016-11-29 2016-11-29 A kind of method and system based on mobile terminal checking Pending CN106815905A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611076752.1A CN106815905A (en) 2016-11-29 2016-11-29 A kind of method and system based on mobile terminal checking

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611076752.1A CN106815905A (en) 2016-11-29 2016-11-29 A kind of method and system based on mobile terminal checking

Publications (1)

Publication Number Publication Date
CN106815905A true CN106815905A (en) 2017-06-09

Family

ID=59106663

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611076752.1A Pending CN106815905A (en) 2016-11-29 2016-11-29 A kind of method and system based on mobile terminal checking

Country Status (1)

Country Link
CN (1) CN106815905A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108189935A (en) * 2017-12-06 2018-06-22 北京建筑大学 A kind of shared bicycle and its unlocking method, locking method and lockset
CN110111464A (en) * 2019-05-07 2019-08-09 深圳市科发智能技术有限公司 A kind of individual palpation key controller entrance guard safety system
CN111325875A (en) * 2018-12-13 2020-06-23 深圳市云海物联科技有限公司 Remote control door lock system and method
CN112446982A (en) * 2019-08-10 2021-03-05 云丁网络技术(北京)有限公司 Method, device, computer readable medium and equipment for controlling intelligent lock
US11417159B2 (en) 2019-08-02 2022-08-16 Yunding Network Technology (Beijing) Co., Ltd. Methods and systems for controlling a smart lock

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1320254A (en) * 1999-08-28 2001-10-31 伯格株式会社 Method for controlling fingerprint identification door lock system
US20020133725A1 (en) * 2001-03-14 2002-09-19 Roy Ronald B. Biometric access control and time and attendance network including configurable system-on-chip (CSOC) processors with embedded programmable logic
CN102110320A (en) * 2010-12-23 2011-06-29 汉王科技股份有限公司 Coerce alarm method and entrance guard control equipment in entrance guard system
CN105117630A (en) * 2015-08-21 2015-12-02 宇龙计算机通信科技(深圳)有限公司 Fingerprint authentication method, fingerprint authentication apparatus, and terminal
CN105847451A (en) * 2016-06-12 2016-08-10 深圳益强信息科技有限公司 Method and system for controlling intelligent access control unit by using mobile terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1320254A (en) * 1999-08-28 2001-10-31 伯格株式会社 Method for controlling fingerprint identification door lock system
US20020133725A1 (en) * 2001-03-14 2002-09-19 Roy Ronald B. Biometric access control and time and attendance network including configurable system-on-chip (CSOC) processors with embedded programmable logic
CN102110320A (en) * 2010-12-23 2011-06-29 汉王科技股份有限公司 Coerce alarm method and entrance guard control equipment in entrance guard system
CN105117630A (en) * 2015-08-21 2015-12-02 宇龙计算机通信科技(深圳)有限公司 Fingerprint authentication method, fingerprint authentication apparatus, and terminal
CN105847451A (en) * 2016-06-12 2016-08-10 深圳益强信息科技有限公司 Method and system for controlling intelligent access control unit by using mobile terminal

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108189935A (en) * 2017-12-06 2018-06-22 北京建筑大学 A kind of shared bicycle and its unlocking method, locking method and lockset
CN111325875A (en) * 2018-12-13 2020-06-23 深圳市云海物联科技有限公司 Remote control door lock system and method
CN110111464A (en) * 2019-05-07 2019-08-09 深圳市科发智能技术有限公司 A kind of individual palpation key controller entrance guard safety system
US11417159B2 (en) 2019-08-02 2022-08-16 Yunding Network Technology (Beijing) Co., Ltd. Methods and systems for controlling a smart lock
US11928904B2 (en) 2019-08-02 2024-03-12 Yunding Network Technology (Beijing) Co., Ltd. Methods and systems for controlling a smart lock
CN112446982A (en) * 2019-08-10 2021-03-05 云丁网络技术(北京)有限公司 Method, device, computer readable medium and equipment for controlling intelligent lock

Similar Documents

Publication Publication Date Title
CN106815905A (en) A kind of method and system based on mobile terminal checking
JP7152466B2 (en) Secure communication method and smart lock system based thereon
CN107046556A (en) A kind of method and system of checking
CN102262793B (en) Entrance guard control method and entrance guard control system
Lee Security notions and advanced method for human shoulder-surfing resistant PIN-entry
CN108055235A (en) A kind of control method of smart lock, relevant device and system
US20070219926A1 (en) Secure method and system of identity authentication
WO2013117019A1 (en) Method and device for system login based on dynamic password generated autonomously by user
CN102945526B (en) A kind of device and method for improving mobile equipment on-line safety of payment
CN103581900B (en) Communication safety control method, device, the first mobile terminal and mobile healthy equipment
CN101794365B (en) The method of safely inputting information and mobile terminal on mobile terminals
CN106682903B (en) A kind of feedback validation method of bank paying Licensing Authority information
CN101350724A (en) Encrypting method base on biology characteristic information
CN104464048B (en) A kind of electronic password lock method for unlocking and device
CN105574963B (en) A kind of gate inhibition's verification method and door control terminal
CN106231092A (en) A kind of phone information security protection method
CN106600767A (en) Verification method and system based on identification card
CN101019366A (en) Method for realizing volatile secret key and separated checking module by collecting human characteristic
CN107046524A (en) It is a kind of based on ultrasonic wave use intelligent entrance guard method and system
CN106780871A (en) A kind of method and system based on mobile terminal alarm
CN106815907A (en) A kind of method and intelligent access control system based on picture password management intelligent entrance guard
CN106022754B (en) Mobile wallet near-field communication cCredit card payment method
CN106815906A (en) A kind of intelligent entrance guard management method and system based on optic communication
CN106713278A (en) Alarm method and system
CN106683239A (en) Mobile terminal response based method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170609

RJ01 Rejection of invention patent application after publication